More BSOD, Need help again

Page 1 of 2 12 LastLast

  1. Posts : 11
    Windows 7 Ultimate 32bit
       #1

    More BSOD, Need help again


    Once again, I continue to recieve BSODS in Windows 7 Ultimate except at about 1 per day instead of 2. Here are the minidumps. This is very frustrating since i thought i had the problem fixed, apparently not. I should also mention this is a full retail install. This computer is also a dual boot system with Windows XP installed as the original operating system. I am running windows 7 32 bit. Is it possible to have outdated XP drivers be the cause of Windows 7 bsods? It sounds unlikely but I am not sure, as I am desperate to try anything and not rule anything out just to find the solution to this. I have run a re-install of Windows 7, sfc /scannow to check corrupt system files, and driver scanner and updated drivers. Not sure what to do next. Ntoskrnl.exe is always in the BSOD report, along with halmacpi.dll. Thought this was also worth mentioning. Here are my 5 minidump files in a folder. Any help very much appreciated.
    Last edited by EduardoYayo; 25 Sep 2010 at 13:47. Reason: Attatched minidumps
      My Computer


  2. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #2

    All of the dumps indicate memory corruption or memory problems.

    Error code D1, DRIVER_IRQL_NOT_LESS_OR_EQUAL - Usually caused by a device driver.

    Error Code 7E, SYSTEM_THREAD_EXCEPTION_NOT_HANDLE - Insufficient disk space, Device driver, Video card, BIOS, Breakpoint with no debugger attached, Hardware incompatibility, Faulty system service, Memory, 3rd party remote control.

    Error Code 19, BAD_POOL_HEADER - usually caused be a device driver.

    Error Code 7F, UNEXPECTED_KERNEL_MODE_TRAP - usual causes are Memory corruption, Hardware (memory in particular), Installing a faulty or mismatched hardware (especially memory) or a failure after installing it, 3rd party firewall, Device drivers, SCSI/network/BIOS updates needed, Improperly seated cards, Incompatible storage devices, Overclocking, Virus scanner, Backup tool, Bad motherboard, Missing Service Pack

    Error Code C2, BAD_POOL_CALLER - usual causes are Device driver, ?Memory

    I find an outdated driver on your system:

    Rt86win7.sys Fri May 22 10:52:05 2009 - This is a network driver. Realtek 8101E/8168/8169 NDIS 6.20 32-bit Driver. Realtek. Update this driver.

    Reboot and see how your system runs. If you get another BSOD, up load the dump and run Memtest to check your RAM. Post your Memtest results. RAM - Test with Memtest86+

    If you do not get any errors in Memtest and still are having BSOD's, enable Driver Verifier. Driver Verifier - Enable and Disable. Upload all dumps generated by Driver Verifier.

    Code:
    Kernel base = 0x81c1b000 PsLoadedModuleList = 0x81d5a570
    Debug session time: Mon Sep 20 18:22:55.936 2010 (GMT-4)
    System Uptime: 0 days 0:39:04.639
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {40010022, 2, 0, 8726c254}
    
    Unable to load image \SystemRoot\system32\DRIVERS\athr.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for athr.sys
    *** ERROR: Module load completed but symbols could not be loaded for athr.sys
    Probably caused by : memory_corruption
    
    Followup: memory_corruption
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 40010022, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000000, value 0 = read operation, 1 = write operation
    Arg4: 8726c254, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from 81d7a700
    Unable to read MiSystemVaType memory at 81d5a0c0
     40010022 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    ndis!ndisIndicateStatusInternal+59f
    8726c254 ad              lods    dword ptr [esi]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  CODE_CORRUPTION
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  81d394f8 -- (.trap 0xffffffff81d394f8)
    ErrCode = 00000000
    eax=87250000 ebx=8463d0e0 ecx=00000028 edx=81d397e4 esi=40010022 edi=8463d0e0
    eip=8726c254 esp=81d3956c ebp=81d39680 iopl=0         nv up ei pl zr na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
    ndis!ndisIndicateStatusInternal+0x59f:
    8726c254 ad              lods    dword ptr [esi]      ds:0023:40010022=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from 8726c254 to 81c53b7b
    
    STACK_TEXT:  
    81d394f8 8726c254 badb0d00 81d397e4 00000003 nt!KiTrap0E+0x2cf
    81d39680 8721f4f2 8463d0e0 81d397e4 00000002 ndis!ndisIndicateStatusInternal+0x59f
    81d396e0 877e320c 009f37f0 81d397e4 81d3974c ndis!NdisFIndicateStatus+0x43b
    81d396f0 8721f48a 845b6e08 81d397e4 81d397e4 wfplwf!FilterStatus+0x14
    81d3974c 87332776 00d0c350 81d397e4 81d399d8 ndis!NdisFIndicateStatus+0x3d3
    81d39764 8721f48a 84d10f68 81d397e4 851caca8 pacer!PcFilterStatus+0x70
    81d397c0 a14d35db 001caca8 81d397e4 85109b18 ndis!NdisFIndicateStatus+0x3d3
    81d3982c a14b52bb 851d2010 40030008 81d399d8 nwifi!ExtSTAIHVSpecificIndication+0x49f
    81d3984c a14baaef 851c9698 40030008 81d399d8 nwifi!Dot11ForwardStatusIndication+0x49
    81d39870 8721f48a 851c9698 81d3996c 84a2ae50 nwifi!Pt6Status+0x151
    81d398cc 877ed2b2 00d0f1a0 81d3996c 81c708c0 ndis!NdisFIndicateStatus+0x3d3
    81d398e8 8726d765 84a2a448 81d3996c 81d22d82 vwififlt!FilterStatus+0x6c
    81d39940 8be7fc0a 8463d002 81d3996c 0023c6b8 ndis!NdisMIndicateStatusEx+0x4f6
    WARNING: Stack unwind information not available. Following frames may be wrong.
    81d39954 8bea2bc7 845b7020 81d3996c 00000000 athr+0x4c0a
    81d399bc 8be9f981 845b7020 40030008 00000000 athr+0x27bc7
    81d399f4 8bea136f 845b7020 8530cb50 00000002 athr+0x24981
    81d39a90 8bea1645 845b7020 00000001 81d39aac athr+0x2636f
    81d39aa0 8be9dfec 845b7020 81d39aec 8be9e1bf athr+0x26645
    81d39aac 8be9e1bf 845b7020 00000000 81d22d82 athr+0x22fec
    81d39aec 8bebaaf2 00000000 845b7020 00000000 athr+0x231bf
    81d39b08 87214774 00000000 845b7210 00000000 athr+0x3faf2
    81d39b38 81c72497 84497d48 00497d10 5fa8b4b6 ndis!ndisMTimerObjectDpc+0xbc
    81d39b7c 81c7243b 81d3cd20 81d39ca8 00000002 nt!KiProcessTimerDpcTable+0x50
    81d39c68 81c722f8 81d3cd20 81d39ca8 00000000 nt!KiProcessExpiredTimerList+0x101
    81d39cdc 81c7068e 00024b18 8525f030 81d46240 nt!KiTimerExpiration+0x25c
    81d39d20 81c704b8 00000000 0000000e 00000000 nt!KiRetireDpcList+0xcb
    81d39d24 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x38
    
    
    STACK_COMMAND:  kb
    
    CHKIMG_EXTENSION: !chkimg -lo 50 -d !ndis
        8726c20c-8726c215  10 bytes - ndis!ndisIndicateStatusInternal+557
        [ 89 8d 10 ff ff ff 8b 8b:08 0a 2c 00 00 22 69 95 ]
        8726c217-8726c3b3  413 bytes - ndis!ndisIndicateStatusInternal+562 (+0x0b)
        [ 00 89 8d 14 ff ff ff 8b:24 37 ad 48 40 00 24 37 ]
    423 errors : !ndis (8726c20c-8726c3b3)
    
    MODULE_NAME: memory_corruption
    
    IMAGE_NAME:  memory_corruption
    
    FOLLOWUP_NAME:  memory_corruption
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MEMORY_CORRUPTOR:  LARGE
    
    FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE
    
    BUCKET_ID:  MEMORY_CORRUPTION_LARGE
    
    Followup: memory_corruption
    ---------
    
    0: kd> lmtsmn
    start    end        module name
    86e1a000 86e62000   ACPI     ACPI.sys     Mon Jul 13 19:11:11 2009 (4A5BBF0F)
    87747000 877a1000   afd      afd.sys      Mon Jul 13 19:12:34 2009 (4A5BBF62)
    8ad7d000 8ad8f000   AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
    86f7e000 86f87000   amdxata  amdxata.sys  Tue May 19 13:57:35 2009 (4A12F30F)
    a1466000 a1468b00   aswFsBlk aswFsBlk.SYS Tue Sep 07 10:47:05 2010 (4C865069)
    a142f000 a1466000   aswMonFlt aswMonFlt.sys Tue Sep 07 10:47:28 2010 (4C865080)
    877a1000 877a5100   aswRdr   aswRdr.SYS   Tue Sep 07 10:47:44 2010 (4C865090)
    8acbe000 8ace4c80   aswSP    aswSP.SYS    Tue Sep 07 10:52:01 2010 (4C865191)
    877a6000 877afc00   aswTdi   aswTdi.SYS   Tue Sep 07 10:52:23 2010 (4C8651A7)
    86f52000 86f5b000   atapi    atapi.sys    Mon Jul 13 19:11:15 2009 (4A5BBF13)
    86f5b000 86f7e000   ataport  ataport.SYS  Mon Jul 13 19:11:18 2009 (4A5BBF16)
    8be7b000 8bfa8000   athr     athr.sys     Mon Oct 05 12:31:48 2009 (4ACA1F74)
    86ec1000 86ecc000   BATTC    BATTC.SYS    Mon Jul 13 19:19:15 2009 (4A5BC0F3)
    876b3000 876ba000   Beep     Beep.SYS     Mon Jul 13 19:45:00 2009 (4A5BC6FC)
    8acb0000 8acbe000   blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
    86ca6000 86cae000   BOOTVID  BOOTVID.dll  Mon Jul 13 21:04:34 2009 (4A5BD9A2)
    a15aa000 a15c3000   bowser   bowser.sys   Mon Jul 13 19:14:21 2009 (4A5BBFCD)
    8d420000 8d43e000   cdd      cdd.dll      unavailable (00000000)
    86cf0000 86d9b000   CI       CI.dll       Mon Jul 13 21:09:28 2009 (4A5BDAC8)
    87655000 8767a000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
    86cae000 86cf0000   CLFS     CLFS.SYS     Mon Jul 13 19:11:10 2009 (4A5BBF0E)
    8ad18000 8ad1b700   CmBatt   CmBatt.sys   Mon Jul 13 19:19:18 2009 (4A5BC0F6)
    8719f000 871fc000   cng      cng.sys      Mon Jul 13 19:32:55 2009 (4A5BC427)
    86eb9000 86ec1000   compbatt compbatt.sys Mon Jul 13 19:19:18 2009 (4A5BC0F6)
    8ad70000 8ad7d000   CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
    8af55000 8af62000   crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
    8ac34000 8ac98000   csc      csc.sys      Mon Jul 13 19:15:08 2009 (4A5BBFFC)
    8ac98000 8acb0000   dfsc     dfsc.sys     Mon Jul 13 19:14:16 2009 (4A5BBFC8)
    873d2000 873de000   discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
    87644000 87655000   disk     disk.sys     Mon Jul 13 19:11:28 2009 (4A5BBF20)
    8af3c000 8af55000   drmk     drmk.sys     Mon Jul 13 20:36:05 2009 (4A5BD2F5)
    8af6d000 8af76000   dump_atapi dump_atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
    8af62000 8af6d000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:11:16 2009 (4A5BBF14)
    8af76000 8af87000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
    8afc2000 8afcc000   Dxapi    Dxapi.sys    Mon Jul 13 19:25:25 2009 (4A5BC265)
    8bd40000 8bdf7000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 20:48:33 2009 (4AC54DE1)
    8bdf7000 8be30000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:25:25 2009 (4A5BC265)
    a609d000 a60c7000   fastfat  fastfat.SYS  Mon Jul 13 19:14:01 2009 (4A5BBFB9)
    86fbb000 86fcc000   fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    86f87000 86fbb000   fltmgr   fltmgr.sys   Mon Jul 13 19:11:13 2009 (4A5BBF11)
    8720a000 87213000   Fs_Rec   Fs_Rec.sys   unavailable (00000000)
    87612000 87644000   fvevol   fvevol.sys   Fri Sep 25 22:24:21 2009 (4ABD7B55)
    8754c000 8757d000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
    8201b000 82052000   hal      halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
    8be30000 8be4f000   HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
    8aebd000 8af0d000   HdAudio  HdAudio.sys  Mon Jul 13 19:51:46 2009 (4A5BC892)
    a1525000 a15aa000   HTTP     HTTP.sys     Mon Jul 13 19:12:53 2009 (4A5BBF75)
    8760a000 87612000   hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
    8bfcc000 8bfe4000   i8042prt i8042prt.sys Mon Jul 13 19:11:23 2009 (4A5BBF1B)
    8b837000 8bd40000   igdkmd32 igdkmd32.sys Wed Sep 23 15:18:09 2009 (4ABA7471)
    86f27000 86f2e000   intelide intelide.sys Mon Jul 13 19:11:19 2009 (4A5BBF17)
    8ad06000 8ad18000   intelppm intelppm.sys Mon Jul 13 19:11:03 2009 (4A5BBF07)
    a6077000 a609d000   ipnat    ipnat.sys    Mon Jul 13 19:54:28 2009 (4A5BC934)
    8bfe4000 8bff1000   kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
    81b52000 81b5a000   kdcom    kdcom.dll    Mon Jul 13 21:08:58 2009 (4A5BDAAA)
    8ae26000 8ae5a000   ks       ks.sys       Mon Jul 13 19:45:13 2009 (4A5BC709)
    8718c000 8719f000   ksecdd   ksecdd.sys   Mon Jul 13 19:11:56 2009 (4A5BBF3C)
    87308000 8732d000   ksecpkg  ksecpkg.sys  Thu Dec 10 23:04:22 2009 (4B21C4C6)
    a14a3000 a14b3000   lltdio   lltdio.sys   Mon Jul 13 19:53:18 2009 (4A5BC8EE)
    8afd7000 8aff2000   luafv    luafv.sys    Mon Jul 13 19:15:44 2009 (4A5BC020)
    86c1d000 86c95000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:06:41 2009 (4A5BDA21)
    8afcc000 8afd7000   monitor  monitor.sys  Mon Jul 13 19:25:58 2009 (4A5BC286)
    8bff3000 8c000000   mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
    86f3c000 86f52000   mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
    a15c3000 a15d5000   mpsdrv   mpsdrv.sys   Mon Jul 13 19:52:52 2009 (4A5BC8D4)
    a15d5000 a15f8000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:32:02 2010 (4B88CA72)
    a15f8000 a1633000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:32:21 2010 (4B88CA85)
    a1633000 a164e000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:32:11 2010 (4B88CA7B)
    8770c000 87717000   Msfs     Msfs.SYS     unavailable (00000000)
    86e6b000 86e73000   msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
    87161000 8718c000   msrpc    msrpc.sys    unavailable (00000000)
    873c8000 873d2000   mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    875fa000 8760a000   mup      mup.sys      Mon Jul 13 19:14:14 2009 (4A5BBFC6)
    87213000 872ca000   ndis     ndis.sys     Mon Jul 13 19:12:24 2009 (4A5BBF58)
    8ada7000 8adb2000   ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
    a14f9000 a1509000   ndisuio  ndisuio.sys  Mon Jul 13 19:53:51 2009 (4A5BC90F)
    8adb2000 8add4000   ndiswan  ndiswan.sys  Mon Jul 13 19:54:34 2009 (4A5BC93A)
    8aeac000 8aebd000   NDProxy  NDProxy.SYS  Mon Jul 13 19:54:27 2009 (4A5BC933)
    8734c000 8735a000   netbios  netbios.sys  Mon Jul 13 19:53:54 2009 (4A5BC912)
    877b0000 877e2000   netbt    netbt.sys    Mon Jul 13 19:12:18 2009 (4A5BBF52)
    872ca000 87308000   NETIO    NETIO.SYS    Mon Jul 13 19:12:35 2009 (4A5BBF63)
    87717000 87725000   Npfs     Npfs.SYS     Mon Jul 13 19:11:31 2009 (4A5BBF23)
    873be000 873c8000   nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
    81c1b000 8201b000   nt       ntkrnlmp.exe Fri Jun 18 23:55:07 2010 (4C1C3F9B)
    87032000 87161000   Ntfs     Ntfs.sys     Mon Jul 13 19:12:05 2009 (4A5BBF45)
    876ac000 876b3000   Null     Null.SYS     unavailable (00000000)
    a14b3000 a14f9000   nwifi    nwifi.sys    Mon Jul 13 19:51:59 2009 (4A5BC89F)
    8732d000 8734c000   pacer    pacer.sys    Mon Jul 13 19:53:58 2009 (4A5BC916)
    86ea8000 86eb9000   partmgr  partmgr.sys  Mon Jul 13 19:11:35 2009 (4A5BBF27)
    86e73000 86e9d000   pci      pci.sys      Mon Jul 13 19:11:16 2009 (4A5BBF14)
    86f2e000 86f3c000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:11:15 2009 (4A5BBF13)
    871fc000 8720a000   pcw      pcw.sys      Mon Jul 13 19:11:10 2009 (4A5BBF0E)
    a1666000 a16fd000   peauth   peauth.sys   Mon Jul 13 20:35:44 2009 (4A5BD2E0)
    8af0d000 8af3c000   portcls  portcls.sys  Mon Jul 13 19:51:00 2009 (4A5BC864)
    86c95000 86ca6000   PSHED    PSHED.dll    Mon Jul 13 21:09:36 2009 (4A5BDAD0)
    8ad8f000 8ada7000   rasl2tp  rasl2tp.sys  Mon Jul 13 19:54:33 2009 (4A5BC939)
    8add4000 8adec000   raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
    8adec000 8ae03000   raspptp  raspptp.sys  Mon Jul 13 19:54:47 2009 (4A5BC947)
    8ae03000 8ae1a000   rassstp  rassstp.sys  Mon Jul 13 19:54:57 2009 (4A5BC951)
    8737d000 873be000   rdbss    rdbss.sys    Mon Jul 13 19:14:26 2009 (4A5BBFD2)
    8ae1a000 8ae24000   rdpbus   rdpbus.sys   Mon Jul 13 20:02:40 2009 (4A5BCB20)
    876f4000 876fc000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:01:40 2009 (4A5BCAE4)
    876fc000 87704000   rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
    87704000 8770c000   rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
    875cd000 875fa000   rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
    a1509000 a151c000   rspndr   rspndr.sys   Mon Jul 13 19:53:20 2009 (4A5BC8F0)
    8be4f000 8be7b000   Rt86win7 Rt86win7.sys Fri May 22 10:52:05 2009 (4A16BC15)
    a1483000 a14a3000   SbieDrv  SbieDrv.sys  Mon Aug 09 06:01:51 2010 (4C5FD20F)
    a16fd000 a1707000   secdrv   secdrv.SYS   Wed Sep 13 09:18:32 2006 (45080528)
    875c5000 875cd000   spldr    spldr.sys    Mon May 11 12:13:47 2009 (4A084EBB)
    a1784000 a17d5000   srv      srv.sys      Mon Jun 21 22:47:32 2010 (4C202444)
    a1735000 a1784000   srv2     srv2.sys     Mon Jun 21 22:47:19 2010 (4C202437)
    a1707000 a1728000   srvnet   srvnet.sys   Mon Jun 21 22:47:09 2010 (4C20242D)
    8ae24000 8ae25380   swenum   swenum.sys   Mon Jul 13 19:45:08 2009 (4A5BC704)
    8b800000 8b836380   SynTP    SynTP.sys    Thu Aug 27 21:59:32 2009 (4A973A04)
    87403000 8754c000   tcpip    tcpip.sys    Sun Jun 13 23:36:59 2010 (4C15A3DB)
    a1728000 a1735000   tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926)
    8773c000 87747000   TDI      TDI.SYS      Mon Jul 13 19:12:12 2009 (4A5BBF4C)
    87725000 8773c000   tdx      tdx.sys      Mon Jul 13 19:12:10 2009 (4A5BBF4A)
    8736d000 8737d000   termdd   termdd.sys   Mon Jul 13 20:01:35 2009 (4A5BCADF)
    8d7e0000 8d7e9000   TSDDD    TSDDD.dll    unavailable (00000000)
    8ace5000 8ad06000   tunnel   tunnel.sys   Mon Jul 13 19:54:03 2009 (4A5BC91B)
    8ae5a000 8ae68000   umbus    umbus.sys    Mon Jul 13 19:51:38 2009 (4A5BC88A)
    8af87000 8af9e000   usbccgp  usbccgp.sys  Mon Jul 13 19:51:31 2009 (4A5BC883)
    8bff1000 8bff2700   USBD     USBD.SYS     Mon Jul 13 19:51:05 2009 (4A5BC869)
    8bfbd000 8bfcc000   usbehci  usbehci.sys  Mon Jul 13 19:51:14 2009 (4A5BC872)
    8ae68000 8aeac000   usbhub   usbhub.sys   Mon Jul 13 19:52:06 2009 (4A5BC8A6)
    8ad1c000 8ad67000   USBPORT  USBPORT.SYS  Mon Jul 13 19:51:13 2009 (4A5BC871)
    8bfb2000 8bfbd000   usbuhci  usbuhci.sys  Mon Jul 13 19:51:10 2009 (4A5BC86E)
    8af9e000 8afc1b00   usbvideo usbvideo.sys Mon Jul 13 19:51:51 2009 (4A5BC897)
    86e9d000 86ea8000   vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
    876ba000 876c6000   vga      vga.sys      Mon Jul 13 19:25:50 2009 (4A5BC27E)
    876c6000 876e7000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
    8757d000 87585380   vmstorfl vmstorfl.sys Mon Jul 13 19:28:44 2009 (4A5BC32C)
    86ecc000 86edc000   volmgr   volmgr.sys   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
    86edc000 86f27000   volmgrx  volmgrx.sys  Mon Jul 13 19:11:41 2009 (4A5BBF2D)
    87586000 875c5000   volsnap  volsnap.sys  Mon Jul 13 19:11:34 2009 (4A5BBF26)
    8bfa8000 8bfb2000   vwifibus vwifibus.sys Mon Jul 13 19:52:02 2009 (4A5BC8A2)
    877e9000 877fa000   vwififlt vwififlt.sys Mon Jul 13 19:52:03 2009 (4A5BC8A3)
    a151c000 a1525000   vwifimp  vwifimp.sys  Mon Jul 13 19:52:09 2009 (4A5BC8A9)
    8735a000 8736d000   wanarp   wanarp.sys   Mon Jul 13 19:55:02 2009 (4A5BC956)
    876e7000 876f4000   watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
    86d9b000 86e0c000   Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
    86e0c000 86e1a000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:11:25 2009 (4A5BBF1D)
    877e2000 877e9000   wfplwf   wfplwf.sys   Mon Jul 13 19:53:51 2009 (4A5BC90F)
    8d580000 8d7ca000   win32k   win32k.sys   unavailable (00000000)
    8ad67000 8ad70000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:19:16 2009 (4A5BC0F4)
    86e62000 86e6b000   WMILIB   WMILIB.SYS   Mon Jul 13 19:11:22 2009 (4A5BBF1A)
    a1469000 a1483000   WudfPf   WudfPf.sys   Mon Jul 13 19:50:13 2009 (4A5BC835)
    
    Unloaded modules:
    a600d000 a6077000   spsys.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    a164e000 a1666000   parport.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    8767a000 87687000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    87687000 87692000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    87692000 8769b000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    8769b000 876ac000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    
    Kernel base = 0x81c53000 PsLoadedModuleList = 0x81d92570
    Debug session time: Wed Sep 22 21:48:53.667 2010 (GMT-4)
    System Uptime: 0 days 1:53:33.385
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................
    Loading User Symbols
    Loading unloaded module list
    .......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000007E, {c0000005, 81eb2d1f, 86a70bb4, 86a70790}
    
    Probably caused by : ntkrnlmp.exe ( nt!CmpRemoveKeyHash+2c )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: c0000005, The exception code that was not handled
    Arg2: 81eb2d1f, The address that the exception occurred at
    Arg3: 86a70bb4, Exception Record Address
    Arg4: 86a70790, Context Record Address
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!CmpRemoveKeyHash+2c
    81eb2d1f 8b08            mov     ecx,dword ptr [eax]
    
    EXCEPTION_RECORD:  86a70bb4 -- (.exr 0xffffffff86a70bb4)
    ExceptionAddress: 81eb2d1f (nt!CmpRemoveKeyHash+0x0000002c)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 00000000
       Parameter[1]: 7f62b17b
    Attempt to read from address 7f62b17b
    
    CONTEXT:  86a70790 -- (.cxr 0xffffffff86a70790)
    eax=7f62b17b ebx=aed1c8c8 ecx=7f62b177 edx=00000828 esi=aed1c8d4 edi=aed1c8c8
    eip=81eb2d1f esp=86a70c7c ebp=86a70c94 iopl=0         nv up ei pl nz na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010206
    nt!CmpRemoveKeyHash+0x2c:
    81eb2d1f 8b08            mov     ecx,dword ptr [eax]  ds:0023:7f62b17b=????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_PARAMETER1:  00000000
    
    EXCEPTION_PARAMETER2:  7f62b17b
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from 81db2700
    Unable to read MiSystemVaType memory at 81d920c0
     7f62b17b 
    
    FOLLOWUP_IP: 
    nt!CmpRemoveKeyHash+2c
    81eb2d1f 8b08            mov     ecx,dword ptr [eax]
    
    BUGCHECK_STR:  0x7E
    
    LAST_CONTROL_TRANSFER:  from 81cae083 to 81eb2d1f
    
    STACK_TEXT:  
    86a70d00 81cae083 00000000 00000000 836954c0 nt!CmpRemoveKeyHash+0x2c
    86a70d50 81e3ad84 00000001 90b2862c 00000000 nt!ExpWorkerThread+0x10d
    86a70d90 81cdc159 81cadf76 00000001 00000000 nt!PspSystemThreadStartup+0x9e
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
    
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!CmpRemoveKeyHash+2c
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c3f9b
    
    STACK_COMMAND:  .cxr 0xffffffff86a70790 ; kb
    
    FAILURE_BUCKET_ID:  0x7E_nt!CmpRemoveKeyHash+2c
    
    BUCKET_ID:  0x7E_nt!CmpRemoveKeyHash+2c
    
    Followup: MachineOwner
    ---------
    
    Kernel base = 0x81c0d000 PsLoadedModuleList = 0x81d4c570
    Debug session time: Thu Sep 23 22:12:47.228 2010 (GMT-4)
    System Uptime: 0 days 0:45:07.931
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................
    Loading User Symbols
    Loading unloaded module list
    .........
    0: kd> !Analyze
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 19, {20, aaad04d0, aaad0500, 1a06080a}
    
    GetPointerFromAddress: unable to read from 81d6c700
    Unable to read MiSystemVaType memory at 81d4c0c0
    Probably caused by : ntkrnlmp.exe ( nt!ExFreePoolWithTag+1b2 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    BAD_POOL_HEADER (19)
    The pool is already corrupt at the time of the current request.
    This may or may not be due to the caller.
    The internal pool links must be walked to figure out a possible cause of
    the problem, and then special pool applied to the suspect tags or the driver
    verifier to a suspect driver.
    Arguments:
    Arg1: 00000020, a pool block header size is corrupt.
    Arg2: aaad04d0, The pool entry we were looking for within the page.
    Arg3: aaad0500, The next pool entry.
    Arg4: 1a06080a, (reserved)
    
    Debugging Details:
    ------------------
    
    GetPointerFromAddress: unable to read from 81d6c700
    Unable to read MiSystemVaType memory at 81d4c0c0
    
    BUGCHECK_STR:  0x19_20
    
    POOL_ADDRESS: GetPointerFromAddress: unable to read from 81d6c700
    Unable to read MiSystemVaType memory at 81d4c0c0
     aaad04d0 
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  plugin-contain
    
    CURRENT_IRQL:  1
    
    LAST_CONTROL_TRANSFER:  from 81e67dec to 81d24c4e
    
    STACK_TEXT:  
    a2323c38 81e67dec aaad04d8 00000000 aaa380c0 nt!ExFreePoolWithTag+0x1b2
    a2323c48 81e5658c b42146ab 8375e348 84e5eaa8 nt!CmpFreePostBlock+0x37
    a2323c84 81e1e0aa 837e8b40 b42146d3 00000000 nt!CmNotifyRunDown+0x176
    a2323cfc 81e25cd9 00000000 ffffffff 001df8c0 nt!PspExitThread+0x497
    a2323d24 81c4279a ffffffff 00000000 001df8cc nt!NtTerminateProcess+0x1fa
    a2323d24 771b64f4 ffffffff 00000000 001df8cc nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    001df8cc 00000000 00000000 00000000 00000000 0x771b64f4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!ExFreePoolWithTag+1b2
    81d24c4e cc              int     3
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!ExFreePoolWithTag+1b2
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c3f9b
    
    FAILURE_BUCKET_ID:  0x19_20_nt!ExFreePoolWithTag+1b2
    
    BUCKET_ID:  0x19_20_nt!ExFreePoolWithTag+1b2
    
    Followup: MachineOwner
    ---------
    
    Kernel base = 0x81c4f000 PsLoadedModuleList = 0x81d8e570
    Debug session time: Fri Sep 24 01:11:29.516 2010 (GMT-4)
    System Uptime: 0 days 2:58:19.219
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................
    Loading User Symbols
    Loading unloaded module list
    ...........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7F, {5, 0, 0, 0}
    
    Probably caused by : VIDEOPRT.SYS ( VIDEOPRT!pVideoPortDispatch+51c )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 00000005, EXCEPTION_BOUND_CHECK
    Arg2: 00000000
    Arg3: 00000000
    Arg4: 00000000
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x7f_5
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  dwm.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 8772736c to 81c882bb
    
    STACK_TEXT:  
    a743f658 8772736c badb0d00 87707014 009e9120 nt!KiSystemFatalException+0xf
    a743f6c8 87709623 00000003 8524c308 84a10738 watchdog!DMgrAcquireDisplayOwnership
    a743f710 81c7df44 84a107f0 859c0f28 8524c364 VIDEOPRT!pVideoPortDispatch+0x51c
    a743f728 81e517ad b15d14b6 a743f8d0 00000000 nt!IofCallDriver+0x63
    a743f800 81e54988 84a10738 8d6a5618 83d09d20 nt!IopParseDevice+0xed7
    a743f87c 81e93354 00000000 a743f8d0 00000240 nt!ObpLookupObjectName+0x4fa
    a743f8dc 81e4ed4e a743fa68 836a5618 84492400 nt!ObOpenObjectByName+0x165
    a743f958 81ea4f55 a743fa58 00000000 a743fa68 nt!IopCreateFile+0x673
    a743f9a0 81c8479a a743fa58 00000000 a743fa68 nt!NtOpenFile+0x2a
    a743f9a0 81c82b0d a743fa58 00000000 a743fa68 nt!KiFastCallEntry+0x12a
    a743fa30 81eb16a3 a743fa58 00000000 a743fa68 nt!ZwOpenFile+0x11
    a743fa84 81431f16 a743fae0 00000000 a743fafc nt!IoGetDeviceObjectPointer+0x59
    a743fb80 81515881 00000000 84e3b760 00000000 win32k!GreSfmClenupPresentHistory+0xf9
    a743fba4 814f116d 84e3b760 00000001 ffa41dd8 win32k!xxxDwmStopRedirection+0xc2
    a743fbbc 814dfb82 00000001 26229b2c 00000000 win32k!xxxDwmProcessShutdown+0x28
    a743fc08 814dcfff 84492420 84492420 00000000 win32k!xxxDestroyThreadInfo+0x3b0
    a743fc1c 814deb1e 84492420 00000001 84492420 win32k!UserThreadCallout+0x77
    a743fc38 81e60068 84492420 00000001 b15d1002 win32k!W32pThreadCallout+0x3a
    a743fcb4 81ec373c 40010004 85cfe1a8 00000001 nt!PspExitThread+0x455
    a743fccc 81cbea72 85cfe1a8 a743fcf8 a743fd04 nt!PsExitSpecialApc+0x22
    a743fd1c 81c84854 00000001 00000000 a743fd34 nt!KiDeliverApc+0x28b
    a743fd1c 76e164f4 00000001 00000000 a743fd34 nt!KiServiceExit+0x64
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    0081f66c 00000000 00000000 00000000 00000000 0x76e164f4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    VIDEOPRT!pVideoPortDispatch+51c
    87709623 85c0            test    eax,eax
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  VIDEOPRT!pVideoPortDispatch+51c
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: VIDEOPRT
    
    IMAGE_NAME:  VIDEOPRT.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc27d
    
    FAILURE_BUCKET_ID:  0x7f_5_VIDEOPRT!pVideoPortDispatch+51c
    
    BUCKET_ID:  0x7f_5_VIDEOPRT!pVideoPortDispatch+51c
    
    Followup: MachineOwner
    ---------
    
    Kernel base = 0x81c3a000 PsLoadedModuleList = 0x81d79570
    Debug session time: Sat Sep 25 12:53:49.643 2010 (GMT-4)
    System Uptime: 0 days 2:01:49.346
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...................
    Loading User Symbols
    Loading unloaded module list
    ........
    0: kd> !Analyze
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck C2, {7, 1097, 120c0832, ffa3dc50}
    
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    BAD_POOL_CALLER (c2)
    The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
    Arguments:
    Arg1: 00000007, Attempt to free pool which was already freed
    Arg2: 00001097, (reserved)
    Arg3: 120c0832, Memory contents of the pool block
    Arg4: ffa3dc50, Address of the block of pool being deallocated
    
    Debugging Details:
    ------------------
    
    GetPointerFromAddress: unable to read from 81d99700
    Unable to read MiSystemVaType memory at 81d790c0
    
    POOL_ADDRESS: GetPointerFromAddress: unable to read from 81d99700
    Unable to read MiSystemVaType memory at 81d790c0
     ffa3dc50 
    
    BUGCHECK_STR:  0xc2_7
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  explorer.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 914e8cf5 to 81d51c4e
    
    STACK_TEXT:  
    a70f3c64 914e8cf5 ffa3dc50 00000000 a70f3c80 nt!ExFreePoolWithTag+0x1b2
    a70f3c74 914ea884 ffa3dc50 a70f3c90 914ed5f8 win32k!WMsg_midl_user_free+0x10
    a70f3c80 914ed5f8 84fbf2d8 ffa3dc50 a70f3cdc win32k!ExFreeToPagedLookasideList+0x1e
    a70f3c90 914edb10 ffa3dc50 00000004 914fe76e win32k!FreeObject+0x23
    a70f3c9c 914fe76e a70f3cfc 914fe196 366c5ce0 win32k!REGION::vDeleteREGION+0x14
    a70f3ca4 914fe196 366c5ce0 00000000 00000000 win32k!DC::vReleaseVis+0x29
    a70f3cdc 914fddd2 a70f3cfc ffb8f748 00000000 win32k!bDeleteDCInternalWorker+0x159
    a70f3d08 914dfaa9 010107bb 00000000 00000000 win32k!bDeleteDCInternal+0x30
    a70f3d28 81c6f79a 010107bb 0232f5a8 776a64f4 win32k!NtGdiDeleteObjectApp+0xa0
    a70f3d28 776a64f4 010107bb 0232f5a8 776a64f4 nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    0232f5a8 00000000 00000000 00000000 00000000 0x776a64f4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    win32k!WMsg_midl_user_free+10
    914e8cf5 5d              pop     ebp
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  win32k!WMsg_midl_user_free+10
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: win32k
    
    IMAGE_NAME:  win32k.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c425a
    
    FAILURE_BUCKET_ID:  0xc2_7_win32k!WMsg_midl_user_free+10
    
    BUCKET_ID:  0xc2_7_win32k!WMsg_midl_user_free+10
    
    Followup: MachineOwner
    ---------
    Last edited by CarlTR6; 25 Sep 2010 at 14:32.
      My Computer


  3. Posts : 11
    Windows 7 Ultimate 32bit
    Thread Starter
       #3

    Thank you very much, will do it
      My Computer


  4. Posts : 11
    Windows 7 Ultimate 32bit
    Thread Starter
       #4

    Question, would i have to update the driver on xp and windows 7 since my system is dual boot, or just windows 7?
      My Computer


  5. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #5

    Just Windows 7. The Windows OS's don't draw from each other.
      My Computer


  6. Posts : 11
    Windows 7 Ultimate 32bit
    Thread Starter
       #6

    ok, thought so. Will update driver now. If i get no crash today or tomorrow, ill know it worked since i get daily crashes
      My Computer


  7. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #7

    Be sure to let us know. Here's hoping!
      My Computer


  8. Posts : 11
    Windows 7 Ultimate 32bit
    Thread Starter
       #8

    Hooray! I got my bsod of the day :) here is the dump. This time something is with ntoskrnl.exe and halmacpi.dll that i've never seen. New to me
      My Computer


  9. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #9

    I was hoping you wouldn't have a crash. This one doesn't tell us very much except it recommends Driver Verifier. The dump does not point to a particular driver. ntoskrnl.exe is a Windows system core file.

    Error code 19, BAD_POOL_HEADER - usually caused by a device driver

    Code:
    Kernel base = 0x81c18000 PsLoadedModuleList = 0x81d57570
    Debug session time: Sun Sep 26 18:45:22.293 2010 (GMT-4)
    System Uptime: 0 days 2:45:07.012
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....................
    Loading User Symbols
    Loading unloaded module list
    ..........
    0: kd> !Analyze
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 19, {20, ad64d560, ad64d648, a1d020d}
    
    GetPointerFromAddress: unable to read from 81d77700
    Unable to read MiSystemVaType memory at 81d570c0
    Probably caused by : ntkrnlmp.exe ( nt!ExFreePoolWithTag+1b2 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    BAD_POOL_HEADER (19)
    The pool is already corrupt at the time of the current request.
    This may or may not be due to the caller.
    The internal pool links must be walked to figure out a possible cause of
    the problem, and then special pool applied to the suspect tags or the driver
    verifier to a suspect driver.
    Arguments:
    Arg1: 00000020, a pool block header size is corrupt.
    Arg2: ad64d560, The pool entry we were looking for within the page.
    Arg3: ad64d648, The next pool entry.
    Arg4: 0a1d020d, (reserved)
    
    Debugging Details:
    ------------------
    
    GetPointerFromAddress: unable to read from 81d77700
    Unable to read MiSystemVaType memory at 81d570c0
    
    BUGCHECK_STR:  0x19_20
    
    POOL_ADDRESS: GetPointerFromAddress: unable to read from 81d77700
    Unable to read MiSystemVaType memory at 81d570c0
     ad64d560 
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 870b26cb to 81d2fc4e
    
    STACK_TEXT:  
    86a5c680 870b26cb ad64d568 00000000 a6e48720 nt!ExFreePoolWithTag+0x1b2
    86a5c694 870b4e8c 888f8440 ad64d568 a6e48720 Ntfs!LfsDeallocateRestartArea+0x51
    86a5c6ac 87041409 888f8440 a6e48720 01a28c03 Ntfs!LfsDeallocateLbcb+0x21
    86a5c778 870b938c 888f8440 77621457 00000000 Ntfs!LfsFlushLfcb+0x69a
    86a5c7cc 870b303a 018f8440 77621457 00000000 Ntfs!LfsFlushToLsnPriv+0x1a7
    86a5c814 870b2653 888f8440 00000001 00000000 Ntfs!LfsWriteLfsRestart+0x160
    86a5c85c 870e70de 888fff38 00000070 86a5c9b0 Ntfs!LfsWriteRestartArea+0x120
    86a5cadc 870e5b3a 86a5cbdc 844350d8 00000000 Ntfs!NtfsCheckpointVolume+0x1185
    86a5cb30 870e7731 86a5cbdc 844350d8 86a5ccff Ntfs!NtfsCheckpointAllVolumesWorker+0x3b
    86a5cb90 870e5c45 86a5cbdc 00000000 870e5aff Ntfs!NtfsForEachVcb+0x10c
    86a5cd00 81c73083 00000000 00000000 8368a4c0 Ntfs!NtfsCheckpointAllVolumes+0xac
    86a5cd50 81dffd84 00000000 908a794f 00000000 nt!ExpWorkerThread+0x10d
    86a5cd90 81ca1159 81c72f76 00000000 00000000 nt!PspSystemThreadStartup+0x9e
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!ExFreePoolWithTag+1b2
    81d2fc4e cc              int     3
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!ExFreePoolWithTag+1b2
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c3f9b
    
    FAILURE_BUCKET_ID:  0x19_20_nt!ExFreePoolWithTag+1b2
    
    BUCKET_ID:  0x19_20_nt!ExFreePoolWithTag+1b2
    
    Followup: MachineOwner
    ---------
    It's time to run Memtest to check your RAM. Errors if any will show up in red. Post your Memtest results. RAM - Test with Memtest86+


    If Memtest does not show any errors with your RAM, enable Driver Verifier.
    Driver Verifier - Enable and Disable. If Driver Verifier encounters a faulty driver, it will cause a BSOD. Upload any Driver Verifier enabled dump.


      My Computer


  10. Posts : 11
    Windows 7 Ultimate 32bit
    Thread Starter
       #10

    OK i will do that now. Ill report back tomorrow i will leave it going overnight. Thanks for all the help, I hope i can get this fixed!
      My Computer


 
Page 1 of 2 12 LastLast

Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 21:32.
Find Us